Abstract
The greatest threats to the security, privacy, and reliability of computer networks and other related information systems in general are cyber crimes committed by cyber criminals, but most importantly hackers. Judging by the damage caused by past cyber criminal and hacker attacks to computer networks in businesses, governments, and individuals, resulting in inconvenience and loss of productivity and credibility, one cannot fail to see that there is a growing community demand to software and hardware companies to create more secure products that can be used to identify threats and vulnerabilities, to fix problems, and to deliver security solutions.
References
Cybercrime threat “real and growing”. http://news.bbc.co.uk/2/hi/science/nature/978163.stm
Glossary of vulnerability testing terminology. http://www.ee.oulu.fi/research/ouspg/sage/glossary/
Anatomy of an attack. The Economist, 19–25 February 2000
Kizza JM (2003) Social and ethical issues in the information age, 2nd edn. Springer, New York
Freeh LJ, FBI congressional report on cybercrime. http://www.fbi.gov/congress00/cyber021600.htm
Slatalla M, A brief history of hacking. http://tlc.discovery.com/convergence/hackers/articles/history.html
Phone phreaking: the telecommunications underground. http://telephonetribute.com/phonephreaking.html
Timeline of hacking. http://fyi.cnn.com/fyi/interactive/school.tools/timelines/1999/computer.hacking/frameset.exclude.html
Rosenbaum R, Secrets of the little blue box. http://www.webcrunchers.com/crunch/esqart.html
The complete history of hacking. http://www.wbglinks.net/pages/history/
Denning PJ (1990) Computers under attack: intruders, worms and viruses. ACM Press, New York
Denning D, Activism, hacktivism, and cyberterrorisim: the internet as a tool or influencing foreign policy. http://www.nautilus.og/info-policy/workshop/papers/denning.html
Lemos R, Online vandals smoke New York Times site CNET News.com. http://news.com.com/2009–1001–252754.html
Shachtman N, Hacktivists stage virtual sit-in at WEF Web site AlterNet. http://www.alternet.org/story.html?StoryID=12374
Kizza JM (2001) Computer network security and cyber ethics. McFarland, North Calorina
Forchet K (1994) Computer security management. Boyd & Frasher Publishing, Danvers
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2015). Cyber Crimes and Hackers. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_5
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6654-2_5
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6653-5
Online ISBN: 978-1-4471-6654-2
eBook Packages: Computer ScienceComputer Science (R0)